Western Digital’s Advanced Format

“What is it? In a nutshell, it’s replacing the traditional 512 byte hard drive sector with a 4 kilobyte (4,096B) hard drive sector for a number of practical and technological reasons. The move to 4K-sectors has been some 10 years

Experimental Validation Tool For Cell Phone Forensics Developed

Viewers of TV dramas don’t focus on the technology behind how a forensics crime team tracks a terrorist or drug ring using cell phone data, but scientists at the National Institute of Standards and Technology (NIST) do. NIST researchers have

His Facebook Status Now? ‘Charges Dropped’

Where’s my pancakes, read Rodney Bradford’s Facebook page, in a message typed on Saturday, Oct. 17, at 11:49 a.m., from a computer in his father’s apartment in Harlem. At the time, the sentence, written in indecipherable street slang, was just

Microsoft Make Digital Forensics Tool Available to Law Enforcement

At the Digital Crimes Consortium, Microsoft Corp. and the National White Collar Crime Center (NW3C) announced an agreement establishing NW3C as the first U.S.-based distributor of the Computer Online Forensic Evidence Extractor (COFEE). A Microsoft-developed program, COFEE uses digital forensic

Court of Appeals ruling limits electronic searches

A federal appeals court this week ruled that government investigators cannot retain incriminating information found in electronic searches unless it is within the scope of a search warrant… More (Computerworld)

iPhone Forensics Webcasts

iPhone Forensics Demonstration: http://www.youtube.com/watch?v=op-HyBVN2Ek iPhone Forensics 101: Bypassing the iPhone Passcode http://www.youtube.com/watch?v=aaxSF9EOjxw

Digital Forensics: The Chance to Play Detective

After Hurricane Katrina devastated much of Louisiana, the state was granted $9 billion for recovery and disbursement to individual homeowners. Keith Barger, a director in KPMG’s Forensic practice in Houston, was put in charge of a forensics and fraud team

State of Mac data forensics

As Apple’s computers and mobile devices become increasingly popular, they sometimes get used by criminals. But with their current hardware and new software tools from Blackbag Technology and SubRosaSoft, Macs are also becoming the tools of choice for forensics examiners…

Mac for Computer Forensics & e-discovery

While most computer users have good intentions, a small minority do not. Law enforcement and security-focused IT professionals need flexible, powerful tools for examining the computers of those suspected of wrongdoing. You’ll hear a panel of distinguished experts, with over

Cracking the case: ‘DOMEX’ system is tool used to analyze crime

When Baltimore authorities seized computers connected to a multimillion-dollar Internet pharmacy operation in late 2006, they turned to Johnstown for help. Specialists at the National Drug Intelligence Center analyzed large amounts of electronic information, providing crucial evidence that led to

Forensics with dd

http://www.informit.com/articles/article.aspx?p=27203&seqNum=3 This chapter is from the book SANS GIAC Certification: Security Essentials Toolkit (GSEC) Step-by-step instruction on how to image a hard drive with Linux’s dd program.

Google searches lead to murder conviction

5th Circuit Appeal court upheld a murder conviction based on Google searches and a suggestive Guns N’ Roses song he downloaded. He appealed on grounds that the evidence was wholly circumstantial and insufficient for conviction. A Florida state appeals court

Damaged DVD Recovery and Forensics

“My friend, Xenon, recently pointed me to an article on digitial forensics. According to the report, the conviction of the accused was dependent on the recorded testimony of one of the victims. Unfortunately, the recording was saved on a DVD,

The Hash Algorithm Dilemma – Hash Value Collisions

Recently, research and news has created a great deal of discussion about hash algorithms and their validity for forensic uses. Over the past several years, the primary hash algorithm used in forensic applications, MD5, has been compromised for use in

Microsoft’s Computer Investigation Guide For Windows

This guide discusses processes and tools for use in internal computer investigations. It introduces a multi-phase model that is based on well-accepted procedures in the computer investigation community. It also presents an applied scenario example of an internal investigation in